Business process modelling, simulation and reengineering: call centres R Doomun, N Vunka Jungum Business Process Management Journal 14 (6), 838-848, 2008 | 130 | 2008 |
An energy‐efficient and security aware route selection protocol for wireless sensor networks T Hayajneh, R Doomun, G Al‐Mashaqbeh, BJ Mohd Security and Communication Networks 7 (11), 2015-2038, 2014 | 48 | 2014 |
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security. MR Doomun, KMS Soyjaudah Int. J. Netw. Secur. 9 (1), 82-94, 2009 | 43 | 2009 |
Multi‐level information system security in outsourcing domain M Razvi Doomun Business Process Management Journal 14 (6), 849-857, 2008 | 41 | 2008 |
Integrated green cloud computing architecture MN Hulkury, MR Doomun 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 39 | 2012 |
Low-cost bluetooth mobile positioning for location-based application MZ Barahim, MR Doomun, N Joomun 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-4, 2007 | 35 | 2007 |
Secloud: Source and destination seclusion using clouds for wireless ad hoc networks R Doomun, T Hayajneh, P Krishnamurthy, D Tipper 2009 IEEE Symposium on Computers and Communications, 361-367, 2009 | 28 | 2009 |
Energy consumption and computational analysis of Rijndael-AES MR Doomun, KMS Soyjaudah, D Bundhoo 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-6, 2007 | 25 | 2007 |
Novel algorithms and techniques in telecommunications and networking TM Sobh, K Elleithy, A Mahmood Springer, 2010 | 24 | 2010 |
Innovative algorithms and techniques in automation, industrial electronics and telecommunications T Sobh, K Elleithy, A Mahmood, M Karim Springer Science & Business Media, 2007 | 23 | 2007 |
Source—destination obfuscation in wireless ad hocnetworks T Hayajneh, R Doomun, P Krishnamurthy, D Tipper Security and Communication Networks 4 (8), 888-901, 2011 | 18 | 2011 |
HCRBAC –An Access Control System for Collaborative Context-Aware HealthCare Services in Mauritius O Moonian, S Cheerkoot-Jalim, SD Nagowah, KK Khedo, R Doomun, ... Journal of Health Informatics in Developing Countries 2 (2), 2008 | 18 | 2008 |
AES-CBC software execution optimization R Doomun, J Doma, S Tengur 2008 International Symposium on Information Technology 1, 1-8, 2008 | 16 | 2008 |
Resource saving AES-CCMP design with hybrid counter mode block chaining-MAC MR Doomun, KMS Soyjaudah IJCSNS International Journal of Computer Science and Network Security 8 (10 …, 2008 | 14 | 2008 |
Collaborative driving support system in mobile pervasive environments NV Jungum, RM Doomun, SD Ghurbhurrun, S Pudaruth 2008 The Fourth International Conference on Wireless and Mobile …, 2008 | 8 | 2008 |
Route extrapolation for source and destination camouflage in wireless ad hoc networks MR Doomun, KMS Soyjaudah 2010 Proceedings of 19th International Conference on Computer Communications …, 2010 | 6 | 2010 |
AES CCMP Algorithm with N-Way Interleaved Chiper Block Chaining Z Codabux-Rossan, MR Doomun University of Mauritius Research Journal 15 (1), 527-544, 2009 | 6 | 2009 |
Adaptive IEEE 802.11 i security for energy-security optimization MR Doomun, KMS Soyjaudah The Third Advanced International Conference on Telecommunications (AICT'07 …, 2007 | 6 | 2007 |
Performance of interleaved cipher block chaining in CCMP Z Codabux-Rossan, MR Doomun Novel Algorithms and Techniques in Telecommunications and Networking, 53-58, 2010 | 5 | 2010 |
Business Process Modelling, Simulation and Reengineering: Call Centress D Razvi, VJ Nevin Business Process Management Journal 6, 838-848, 2008 | 4 | 2008 |